CN102999420B - Based on cross site scripting leak method of testing and the system of DOM - Google Patents

Based on cross site scripting leak method of testing and the system of DOM Download PDF

Info

Publication number
CN102999420B
CN102999420B CN201110270272.XA CN201110270272A CN102999420B CN 102999420 B CN102999420 B CN 102999420B CN 201110270272 A CN201110270272 A CN 201110270272A CN 102999420 B CN102999420 B CN 102999420B
Authority
CN
China
Prior art keywords
dirty data
code
scripted
leak
variable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110270272.XA
Other languages
Chinese (zh)
Other versions
CN102999420A (en
Inventor
谢雄钦
吴翰清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201110270272.XA priority Critical patent/CN102999420B/en
Publication of CN102999420A publication Critical patent/CN102999420A/en
Priority to HK13105938.9A priority patent/HK1178294A1/en
Application granted granted Critical
Publication of CN102999420B publication Critical patent/CN102999420B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

This application provides a kind of cross site scripting leak method of testing based on DOM, comprising: the source code also extraction scripted code wherein obtaining target pages; Travel through all scripted codes, utilize predefined dirty data entrance to obtain the variable that in scripted code, all dirty data entrances and dirty data entrance transmit; Again travel through all scripted codes, obtain the output function in described scripted code, and the parameter extracting output function is mated with the variable of dirty data entrance and the transmission of dirty data entrance, if can mate, then define leak and exist; Record vulnerability information.The application also provides a kind of cross site scripting leak test macro based on DOM realizing preceding method.The cross site scripting leak method of testing based on DOM of the application and system, can solve the problem that the cross site scripting leak based on DOM cannot accurately be tested.

Description

Based on cross site scripting leak method of testing and the system of DOM
Technical field
The application relates to computer network security technical field of measurement and test, particularly relates to a kind of cross site scripting leak method of testing based on DOM and system.
Background technology
Cross site scripting leak (CrossSiteScripting often writes a Chinese character in simplified form and makes XSS) is that web application has problems when data being outputted to webpage, causes assailant the malicious data of structure can be presented at the leak of the page.The malicious code that cross-site scripting attack injects runs in a browser, can control the browser of user, and obtains subscriber computer information, intercepts and captures user input through keyboard, spies LAN Information residing for user and even attack other websites.Wherein, DOM (DocumentObjectModel, DOM Document Object Model) is the page that JavaScript exports, and the cross site scripting leak based on DOM is exactly the leak appeared in JavaScript code.
Test for cross site scripting leak adopts Black-box Testing more, namely when not knowing source code by test that various technological means is carried out web application.Be generally amendment parameter value be a banner string, then whether searched page is containing this character string, if had, the page can export parameter, now judges whether leaky by analyzing back page structure attack parameter.But the cross site scripting leak based on DOM is exactly the leak appeared in JavaScript code, general Black-box Testing cannot judge whether by searched page source code the banner string that imports into, also just cannot judge whether leaky appearance, therefore existing method of testing cannot realize the accurate test of leak.
Summary of the invention
Technical problems to be solved in this application are to provide a kind of cross site scripting leak method of testing based on DOM and system, can solve the problem that the cross site scripting leak based on DOM cannot accurately be tested.
In order to solve the problem, this application discloses a kind of cross site scripting leak method of testing based on DOM, comprising the following steps:
Obtain the source code also extraction scripted code wherein of target pages;
Travel through all scripted codes, utilize predefined dirty data entrance to obtain the variable that in scripted code, all dirty data entrances and dirty data entrance transmit;
Again travel through all scripted codes, obtain the output function in described scripted code, and the parameter extracting output function is mated with the variable of dirty data entrance and the transmission of dirty data entrance, if can mate, then define leak and exist;
Record vulnerability information.
Further, described acquisition target pages source code and extract scripted code wherein and comprise:
Adopt the scripted code in plug-in unit acquisition source code; Or
The content in the script label of scripted code is intercepted by character string, and by the content splicing in each script label.
Further, all scripted codes of described traversal, the variable utilizing predefined dirty data entrance to obtain all dirty data entrances and the transmission of dirty data entrance in scripted code comprises:
To line by line scan code, if scan equal sign, then assignment statement is divided into left and right two parts;
By the array that equal sign right-hand component regular expression is divided into letter, numeral and underscore to form;
Extract predefined dirty data entrance, mate with described array, if can mate, then extract the variable on the equal sign left side, and be kept in the array of dirty data together with equal sign right-hand component;
Repeat aforementioned three steps, until all codes have all scanned.
Further, describedly again travel through all scripted codes, obtain the output function in described scripted code, and the parameter extracting output function mated with the variable of dirty data entrance and the transmission of dirty data entrance, if can mate, then define leak and exist and comprise:
The variable of the parameter of output function with dirty data entry variable and the transmission of dirty data entrance is mated, if having at least one can match, then defines leak and exist.
Further, also comprise after described record vulnerability information:
Return or show vulnerability information.
Further, described acquisition target pages source code and also comprise after extracting scripted code wherein:
Carry out pre-service to the scripted code extracted, described pre-service comprises the dead code removed or replace in described scripted code.
In order to solve the problem, disclosed herein as well is a kind of cross site scripting leak test macro based on DOM, comprising:
Code obtaining module, the source code for obtaining target pages also extracts scripted code wherein;
Dirty data variable acquisition module, for traveling through all scripted codes, utilizes predefined dirty data entrance to obtain the variable that in scripted code, all dirty data entrances and dirty data entrance transmit;
Leak identification module, travels through all scripted codes again, obtains the output function in described scripted code, and the parameter extracting output function is mated with the variable of dirty data entrance and the transmission of dirty data entrance, if can mate, then defines leak and exists;
Information recording unit, for recording vulnerability information.
Further, described Code obtaining module comprises:
Bound cell, for adopting the scripted code in plug-in unit acquisition source code; Or
Interception unit, for intercepting the content in the script label of scripted code, and by the content splicing in each script label by character string.
Further, described dirty data variable acquisition module comprises:
Code scans unit, for code of lining by line scan, if scan equal sign, is then divided into left and right two parts assignment statement;
Cutting unit, for the array being divided into letter, numeral and underscore to form equal sign right-hand component regular expression;
Matching unit, for extracting predefined dirty data entrance, mates with described array, if can mate, then extracts the variable on the equal sign left side, and is kept in the array of dirty data together with equal sign right-hand component.
Further, described leak identification module module comprises:
Matching unit, for being mated by the variable of the parameter of output function with dirty data entry variable and the transmission of dirty data entrance, if having at least one can match, then defines leak and exists.
Further, described system also comprises:
Vulnerability information feedback module, for returning or showing vulnerability information.
Further, described system also comprises:
Pretreatment module, for carrying out pre-service to the scripted code extracted, removes or replaces the dead code in described scripted code.
Compared with prior art, the application comprises following advantage:
The application is by extracting page source code, and therefrom obtain scripted code, by the scanning to scripted code, and carry out mating with predefined dirty data entrance the variable obtaining dirty data entrance and dirty data entrance and transmit, thus find the cross site scripting leak finding based on DOM based on source code.
Further, in the scanning process of scripted code, adopt the mode of lining by line scan, therefore after discovery leak, the position of leak can be navigated to certain a line, thus location when being convenient to follow-up reparation.
In addition, the assignment statement in scripted code is separated by regular expression, carry out the mode of mating by the array after segmentation and predefined dirty data entrance, the variable of dirty data entrance and the transmission of dirty data entrance can be extracted comparatively accurately, ensure the accuracy of Hole Detection.And without the need to adopting javascript engine, just can show problem when writing code and also not having issue to reach the standard grade, can pinpoint the problems timely and solve.
Certainly, the arbitrary product implementing the application not necessarily needs to reach above-described all advantages simultaneously.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the cross site scripting leak method of testing embodiment one based on DOM of the application;
Fig. 2 is the process flow diagram of the cross site scripting leak method of testing embodiment two based on DOM of the application;
Fig. 3 is the structural representation of the cross site scripting leak test macro embodiment one based on DOM of the application;
Fig. 4 is the structural representation of the cross site scripting leak test macro embodiment two based on DOM of the application.
Embodiment
For enabling above-mentioned purpose, the feature and advantage of the application more become apparent, below in conjunction with the drawings and specific embodiments, the application is described in further detail.
With reference to Fig. 1, a kind of cross site scripting leak method of testing embodiment one based on DOM of the application is shown, comprises the following steps:
Step 101, obtains the source code also extraction scripted code wherein of target pages.
Wherein, from source code, extract script (javascript) content can directly obtain with plug-in unit, such as, can directly obtain with hpricot plug-in unit in ruby.In addition, also can intercept the content in script label by the mode that character string intercepts, the content in each script label is being stitched together.
Step 102, travels through all scripted codes, utilizes predefined dirty data entrance to obtain the variable that in scripted code, all dirty data entrances and dirty data entrance transmit.
Dirty data is the data that possible utilize leak to realize malicious attack, concrete, comprising its dependent variable that the entrance of all Dom and these entrances are delivered to, can carry out statistics acquisition by attacking original leak.In this example, predefined dirty data comprises: location, document.referrer, window.name, document.URL etc., in addition, if included in code: aaa=document.URL; So, aaa also can be considered to dirty data.
Wherein, the concrete process that traversal scripted code obtains dirty data entrance and dirty data entrance transmission variable is: all scripted codes of lining by line scan, if scan equal sign, then assignment statement is divided into left and right two parts according to equal sign, the array that right-hand component regular expression is divided into letter, numeral and underscore to form; Extract predefined dirty data entrance, and mate with the array that right-hand component forms, if comprise predefined dirty data entrance in array, just extract the variable on the left side, and be together saved in the array of dirty data together with the right-hand component of equal sign, until traveled through, get the variable of all dirty data entrances and the transmission of dirty data entrance.
Step 103, travels through all scripted codes again, obtains the output function in described scripted code, and the parameter extracting output function is mated with the variable of dirty data entrance and the transmission of dirty data entrance, if can mate, then defines leak and exists.
Wherein, the process of coupling is, is mated by the variable of the parameter of output function with dirty data entry variable and the transmission of dirty data entrance, if having at least one can match, then defines leak and exists.
Step 104, record vulnerability information.
After defining leak existence, then can record the relevant information of leak, so that subsequent treatment.Such as, the position, the dirty data relevant to leak etc. of leak.
Further, after record vulnerability information, vulnerability information can also be returned to user or show, thus be convenient to user leak is repaired.
With reference to Fig. 2, the cross site scripting leak method of testing embodiment two based on DOM of the application is shown, further, further comprising the steps of after abovementioned steps 101:
Step 201, carries out pre-service to the scripted code extracted.
Pre-service comprises removes or the dead code replaced in this scripted code, namely has nothing to do with subsequent treatment, to the code that subsequent treatment can not have an impact, such as loop code, judge code etc.Wherein, regular expression can be adopted to search the dead code can removed or replace in scripted code, to ensure that pre-service can complete fast and accurately.The total amount of code can be reduced after pre-service is carried out to scripted code, thus improve the speed of subsequent treatment.
The application is by extracting page source code, and therefrom obtain scripted code, by the scanning to scripted code, and carry out mating with predefined dirty data entrance the variable obtaining dirty data entrance and dirty data entrance and transmit, thus find the cross site scripting leak finding based on DOM based on source code.
Further, in the scanning process of scripted code, adopt the mode of lining by line scan, therefore after discovery leak, the position of leak can be navigated to certain a line, thus location when being convenient to follow-up reparation.
In addition, the assignment statement in scripted code is separated by regular expression, carry out the mode of mating by the array after segmentation and predefined dirty data entrance, the variable of dirty data entrance and the transmission of dirty data entrance can be extracted comparatively accurately, ensure the accuracy of Hole Detection.And without the need to adopting javascript engine, just can show problem when writing code and also not having issue to reach the standard grade, can pinpoint the problems timely and solve.
With reference to Fig. 3, the cross site scripting leak test macro embodiment one based on DOM of the application is shown, comprises Code obtaining module 10, dirty data variable acquisition module 20, leak identification module 30 and information logging modle 40.
Code obtaining module 10, the source code for obtaining target pages also extracts scripted code wherein.
Dirty data variable acquisition module 20, for traveling through all scripted codes, utilizes predefined dirty data entrance to obtain the variable that in scripted code, all dirty data entrances and dirty data entrance transmit.
Leak identification module 30, travels through all scripted codes again, obtains the output function in described scripted code, and the parameter extracting output function is mated with the variable of dirty data entrance and the transmission of dirty data entrance, if can mate, then defines leak and exists.
Information logging modle 40, for recording vulnerability information.
Further, Code obtaining module 10 also comprises bound cell or interception unit.Wherein, bound cell is for adopting the scripted code in plug-in unit acquisition source code.Interception unit is used for the content intercepted by character string in the script label of scripted code, and by the content splicing in each script label.
Further, dirty data variable acquisition module 20 comprises code scans unit, cutting unit and matching unit.Wherein, code scans unit, for code of lining by line scan, if scan equal sign, is then divided into left and right two parts assignment statement.Cutting unit, for the array being divided into letter, numeral and underscore to form equal sign right-hand component regular expression.Matching unit, for extracting predefined dirty data entrance, mates with described array, if can mate, then extracts the variable on the equal sign left side, and is kept in the array of dirty data together with equal sign right-hand component.
Further, leak identification module module also comprises matching unit, for being mated by the variable of the parameter of output function with dirty data entry variable and the transmission of dirty data entrance, if having at least one can match, then defines leak and exists.
Further, this system also comprises vulnerability information feedback module, for returning or showing vulnerability information.
With reference to Fig. 4, the cross site scripting leak test macro embodiment two based on DOM of the application is shown, further, this system also comprises pretreatment module 50, for carrying out pre-service to the scripted code extracted, removes or replace the dead code in described scripted code.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.For system embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, relevant part illustrates see the part of embodiment of the method.
The cross site scripting leak method of testing based on DOM provided the application above and system are described in detail, apply specific case herein to set forth the principle of the application and embodiment, the explanation of above embodiment is just for helping method and the core concept thereof of understanding the application; Meanwhile, for one of ordinary skill in the art, according to the thought of the application, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the application.

Claims (10)

1., based on a cross site scripting leak method of testing of DOM, it is characterized in that, comprise the following steps:
Obtain the source code also extraction scripted code wherein of target pages;
Carry out pre-service to the scripted code extracted, described pre-service comprises removes or the dead code replaced in described scripted code, wherein, described dead code for have nothing to do with subsequent treatment, to the code that subsequent treatment can not have an impact;
Travel through all scripted codes, utilize predefined dirty data entrance to obtain the variable that in scripted code, all dirty data entrances and dirty data entrance transmit, wherein, described dirty data is the data utilizing leak to realize malicious attack;
Again travel through all scripted codes, obtain the output function in described scripted code, and the parameter extracting output function is mated with the variable of dirty data entrance and the transmission of dirty data entrance, if can mate, then define leak and exist;
Record vulnerability information.
2. as claimed in claim 1 based on the cross site scripting leak method of testing of DOM, it is characterized in that, the source code of described acquisition target pages the scripted code extracted wherein comprise:
Adopt the scripted code in plug-in unit acquisition source code; Or
The content in the script label of scripted code is intercepted by character string, and by the content splicing in each script label.
3. as claimed in claim 1 based on the cross site scripting leak method of testing of DOM, it is characterized in that, the all scripted codes of described traversal, the variable utilizing predefined dirty data entrance to obtain all dirty data entrances and the transmission of dirty data entrance in scripted code comprises:
To line by line scan code, if scan equal sign, then assignment statement is divided into left and right two parts;
By the array that equal sign right-hand component regular expression is divided into letter, numeral and underscore to form;
Extract predefined dirty data entrance, mate with described array, if can mate, then extract the variable on the equal sign left side, and be kept in the array of dirty data together with equal sign right-hand component;
Repeat aforementioned three steps, until all codes have all scanned.
4. as claimed in claim 1 based on the cross site scripting leak method of testing of DOM, it is characterized in that, describedly again travel through all scripted codes, obtain the output function in described scripted code, and the parameter extracting output function is mated with the variable of dirty data entrance and the transmission of dirty data entrance, if can mate, then define leak existence and comprise:
The variable of the parameter of output function with dirty data entry variable and the transmission of dirty data entrance is mated, if having at least one can match, then defines leak and exist.
5., as claimed in claim 1 based on the cross site scripting leak method of testing of DOM, it is characterized in that, described record vulnerability information also comprises:
Return or show vulnerability information.
6., based on a cross site scripting leak test macro of DOM, it is characterized in that, comprising:
Code obtaining module, the source code for obtaining target pages also extracts scripted code wherein;
Pretreatment module, for extract scripted code carry out pre-service, remove or replace the dead code in described scripted code, wherein, described dead code for have nothing to do with subsequent treatment, to the code that subsequent treatment can not have an impact;
Dirty data variable acquisition module, for traveling through all scripted codes, utilize predefined dirty data entrance to obtain the variable that in scripted code, all dirty data entrances and dirty data entrance transmit, wherein, described dirty data is the data utilizing leak to realize malicious attack;
Leak identification module, travels through all scripted codes again, obtains the output function in described scripted code, and the parameter extracting output function is mated with the variable of dirty data entrance and the transmission of dirty data entrance, if can mate, then defines leak and exists;
Information recording unit, for recording vulnerability information.
7., as claimed in claim 6 based on the cross site scripting leak test macro of DOM, it is characterized in that, described Code obtaining module comprises:
Bound cell, for adopting the scripted code in plug-in unit acquisition source code; Or
Interception unit, for intercepting the content in the script label of scripted code, and by the content splicing in each script label by character string.
8., as claimed in claim 6 based on the cross site scripting leak test macro of DOM, it is characterized in that, described dirty data variable acquisition module comprises:
Code scans unit, for code of lining by line scan, if scan equal sign, is then divided into left and right two parts assignment statement;
Cutting unit, for the array being divided into letter, numeral and underscore to form equal sign right-hand component regular expression;
Matching unit, for extracting predefined dirty data entrance, mates with described array, if can mate, then extracts the variable on the equal sign left side, and is kept in the array of dirty data together with equal sign right-hand component.
9., as claimed in claim 6 based on the cross site scripting leak test macro of DOM, it is characterized in that, described leak identification module module comprises:
Matching unit, for being mated by the variable of the parameter of output function with dirty data entry variable and the transmission of dirty data entrance, if having at least one can match, then defines leak and exists.
10., as claimed in claim 6 based on the cross site scripting leak test macro of DOM, it is characterized in that, described system also comprises:
Vulnerability information feedback module, for returning or showing vulnerability information.
CN201110270272.XA 2011-09-13 2011-09-13 Based on cross site scripting leak method of testing and the system of DOM Active CN102999420B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201110270272.XA CN102999420B (en) 2011-09-13 2011-09-13 Based on cross site scripting leak method of testing and the system of DOM
HK13105938.9A HK1178294A1 (en) 2011-09-13 2013-05-21 Method and system for cross-site script loophole testing based on dom dom

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110270272.XA CN102999420B (en) 2011-09-13 2011-09-13 Based on cross site scripting leak method of testing and the system of DOM

Publications (2)

Publication Number Publication Date
CN102999420A CN102999420A (en) 2013-03-27
CN102999420B true CN102999420B (en) 2016-02-03

Family

ID=47928017

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110270272.XA Active CN102999420B (en) 2011-09-13 2011-09-13 Based on cross site scripting leak method of testing and the system of DOM

Country Status (2)

Country Link
CN (1) CN102999420B (en)
HK (1) HK1178294A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9317694B2 (en) * 2013-12-03 2016-04-19 Microsoft Technology Licensing, Llc Directed execution of dynamic programs in isolated environments
CN104836779B (en) * 2014-02-12 2019-07-26 上海携程商务有限公司 XSS leak detection method, system and Web server
CN104601540B (en) * 2014-12-05 2018-11-16 华为技术有限公司 A kind of cross site scripting XSS attack defence method and Web server
CN104683328A (en) * 2015-01-29 2015-06-03 兴华永恒(北京)科技有限责任公司 Method and system for scanning cross-site vulnerability
CN104881608B (en) * 2015-05-21 2018-03-16 北京工业大学 A kind of XSS leak detection methods based on simulation browser behavior
CN105049440B (en) * 2015-08-06 2018-04-10 福建天晴数码有限公司 Detect the method and system of cross-site scripting attack injection
CN105512276B (en) * 2015-12-04 2018-12-14 北京金山安全软件有限公司 Method and device for constructing junk file and electronic equipment
CN106547697B (en) * 2016-11-18 2019-03-26 上海华力微电子有限公司 A kind of the automation formula correctness management method and device of NISSIN ion injection machine table
CN108459954B (en) * 2017-02-22 2022-08-26 腾讯科技(深圳)有限公司 Application program vulnerability detection method and device
CN107515742B (en) * 2017-07-18 2020-10-09 北京时医康科技发展有限公司 Architecture method and system for enabling Web page to access local resources of mobile APP
CN108647517B (en) * 2018-05-17 2021-02-09 华中科技大学 Vulnerability detection system and method for Android mixed application code injection
CN110826057B (en) * 2018-08-09 2023-06-02 阿里巴巴集团控股有限公司 Analysis method for data processing path, computer device, and storage medium
CN110708308B (en) * 2019-09-29 2021-08-17 武汉大学 Cross-site script vulnerability mining method and system for cloud computing environment
CN111930616B (en) * 2020-07-27 2024-03-19 北京大米未来科技有限公司 Data processing method, device, electronic equipment and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101471818A (en) * 2007-12-24 2009-07-01 北京启明星辰信息技术股份有限公司 Detection method and system for malevolence injection script web page
CN101964025A (en) * 2009-07-23 2011-02-02 中联绿盟信息技术(北京)有限公司 XSS (Cross Site Scripting) detection method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8407250B2 (en) * 2006-08-07 2013-03-26 Google Inc. Distribution of content document to varying users with security customization and scalability

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101471818A (en) * 2007-12-24 2009-07-01 北京启明星辰信息技术股份有限公司 Detection method and system for malevolence injection script web page
CN101964025A (en) * 2009-07-23 2011-02-02 中联绿盟信息技术(北京)有限公司 XSS (Cross Site Scripting) detection method and device

Also Published As

Publication number Publication date
CN102999420A (en) 2013-03-27
HK1178294A1 (en) 2013-09-06

Similar Documents

Publication Publication Date Title
CN102999420B (en) Based on cross site scripting leak method of testing and the system of DOM
CN102831345B (en) Injection point extracting method in SQL (Structured Query Language) injection vulnerability detection
CN103559235B (en) A kind of online social networks malicious web pages detection recognition methods
CN102253979B (en) Vision-based web page extracting method
US20170293477A1 (en) Analysis device, analysis method, and analysis program
CN103810425B (en) The detection method of malice network address and device
CN105844140A (en) Website login brute force crack method and system capable of identifying verification code
CN102098331B (en) Method and system for reducing WEB type application contents
CN103065095A (en) WEB vulnerability scanning method and vulnerability scanner based on fingerprint recognition technology
CN104200166A (en) Script-based website vulnerability scanning method and system
CN102436563B (en) Method and device for detecting page tampering
CN104881608A (en) XSS vulnerability detection method based on simulating browser behavior
CN103297394B (en) Website security detection method and device
CN109104456A (en) A kind of user tracking based on browser fingerprint and propagating statistics analysis method
CN105760379B (en) Method and device for detecting webshell page based on intra-domain page association relation
CN104881607A (en) XSS vulnerability detection method based on simulating browser behavior
CN107392016A (en) A kind of web data storehouse attack detecting system based on agency
CN103279710A (en) Method and system for detecting malicious codes of Internet information system
CN112989348B (en) Attack detection method, model training method, device, server and storage medium
CN102915318A (en) Method and device for positioning and searching information in browser
CN103870752B (en) A kind of method, apparatus and equipment for being used to detect Flash XSS loopholes
CN105488400A (en) Comprehensive detection method and system of malicious webpage
CN106411906A (en) SQL (Structured Query Language) injection flaw positioning and detecting method
CN102073678B (en) System and method for analyzing information of websites
CN103136251A (en) Method and device of webpage identification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1178294

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1178294

Country of ref document: HK